TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162)
This paper presents a new search region prediction method using the neural network vector quantiz... more This paper presents a new search region prediction method using the neural network vector quantization (VQ) for motion estimation. A major advantage of formulating VQ as a neural network is that the large number of adaptive training algorithms that are used for neural networks can be applied to VQ. The proposed method reduces the computation because of the smaller number of search points than conventional methods, and reduces the bits required to represent motion vectors. The results of computer simulation show that the proposed method provides better PSNR than other block matching algorithms.
The need for more effective ways to analyze network risks in real time has been recognized by sec... more The need for more effective ways to analyze network risks in real time has been recognized by security planners. However, most existing risk analysis tools provide only methodological analysis procedures, and cannot reflect continually changing vulnerability and threat information concerning individual network systems in real time. For this reason, this study suggests a new system design methodology which shows a scheme to collect and analyze data from network intrusion detection systems and vulnerability analysis systems and estimates risk levels. Through field tests, it was proven that the proposed system can provide log analysis functions that help in reasoning out the behavior of an attacker. This paper includes a design concept, the main algorithm and test results.
TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162)
This paper describes a neural network which detects the edges of different orientation and spatia... more This paper describes a neural network which detects the edges of different orientation and spatial frequency in an image. The proposed neural network is useful for image analysis, feature extraction, and texture segmentation.
J. Inform. and Commun. Convergence Engineering, 2005
The cyber attacks on the computer system in nowadays are focused on works that do not operate spe... more The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.
This paper is focused on the development of remote-observation control system supporting the exce... more This paper is focused on the development of remote-observation control system supporting the excellent security functions. This control system uses VPN (Virtual Private Network) supported by IPSec and public network like Internet. The developed XBOX system is operated by embedded system which installed Linux operating system and performs the functions of TCP/IP Protocol processing, security-communication, and etc. Our developed XBOX system can be applied to various applications including an attended device of remote crime prevention. This paper shows the example of transmission the image of the cracking and transmitting the data using our developed system.
TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162)
This paper presents a new search region prediction method using the neural network vector quantiz... more This paper presents a new search region prediction method using the neural network vector quantization (VQ) for motion estimation. A major advantage of formulating VQ as a neural network is that the large number of adaptive training algorithms that are used for neural networks can be applied to VQ. The proposed method reduces the computation because of the smaller number of search points than conventional methods, and reduces the bits required to represent motion vectors. The results of computer simulation show that the proposed method provides better PSNR than other block matching algorithms.
The need for more effective ways to analyze network risks in real time has been recognized by sec... more The need for more effective ways to analyze network risks in real time has been recognized by security planners. However, most existing risk analysis tools provide only methodological analysis procedures, and cannot reflect continually changing vulnerability and threat information concerning individual network systems in real time. For this reason, this study suggests a new system design methodology which shows a scheme to collect and analyze data from network intrusion detection systems and vulnerability analysis systems and estimates risk levels. Through field tests, it was proven that the proposed system can provide log analysis functions that help in reasoning out the behavior of an attacker. This paper includes a design concept, the main algorithm and test results.
TENCON '97 Brisbane - Australia. Proceedings of IEEE TENCON '97. IEEE Region 10 Annual Conference. Speech and Image Technologies for Computing and Telecommunications (Cat. No.97CH36162)
This paper describes a neural network which detects the edges of different orientation and spatia... more This paper describes a neural network which detects the edges of different orientation and spatial frequency in an image. The proposed neural network is useful for image analysis, feature extraction, and texture segmentation.
J. Inform. and Commun. Convergence Engineering, 2005
The cyber attacks on the computer system in nowadays are focused on works that do not operate spe... more The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.
This paper is focused on the development of remote-observation control system supporting the exce... more This paper is focused on the development of remote-observation control system supporting the excellent security functions. This control system uses VPN (Virtual Private Network) supported by IPSec and public network like Internet. The developed XBOX system is operated by embedded system which installed Linux operating system and performs the functions of TCP/IP Protocol processing, security-communication, and etc. Our developed XBOX system can be applied to various applications including an attended device of remote crime prevention. This paper shows the example of transmission the image of the cracking and transmitting the data using our developed system.
Uploads
Papers by DAEHYUN RYU